Exploring the Security Vulnerabilities of LoRa | IEEE Conference Publication | IEEE Xplore